default search action
CICS 2009: Nashville, TN, USA
- 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009. IEEE 2009, ISBN 978-1-4244-2769-7
Tutorial
- Dipankar Dasgupta:
Tutorial: computational intelligence in cyber security.
Network Attacks: analysis and detection
- Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon:
Visualization of network components for attack analysis. 1-8 - Manhyun Chung, Jaeik Cho, Jongsub Moon:
An effective denial of service detection method using kernel based data. 9-12 - Ran Tao, Li Yang, Lu Peng, Bin Li, Alma Cemerlic:
A case study: Using architectural features to improve sophisticated denial-of-service attack detections. 13-18 - Minsoo Lee, Xiaohui Ye, Samuel D. Johnson, Dan Marconett, Chaitanya S. K. Vadrevu, Rao Vemuri, S. J. Ben Yoo:
Cognitive security management with reputation based cooperation schemes in heterogeneous networks. 19-23
Malicious Code Detections
- Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon:
Study of fuzzy clustering methods for malicious codes using native API call frequency. 24-29 - Masanoei Hara, Akira Yamada, Yutaka Miyake:
Visual similarity-based phishing detection without victim site information. 30-36 - Archana Bhattarai, Vasile Rus, Dipankar Dasgupta:
Characterizing comment spam in the blogosphere through content analysis. 37-44
File, Data and Process Security and Analysis
- Rajesh Kumar Pal, Indranil Sengupta:
Enhancing file data security in linux operating system by integrating secure file system. 45-52 - Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee:
Email worm detection by wavelet analysis of DNS query streams. 53-60 - Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta:
Visualization of security events using an efficient correlation technique. 61-68 - Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Managing complex IT security processes with value based measures. 69-75 - Jiang Bian, Remzi Seker:
JigDFS: A secure distributed file system. 76-82
Intrusion Detection Systems
- Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar:
Detection of intrusive activity in databases by combining multiple evidences and belief update. 83-90 - Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers:
Using qualia and multi-layered relationships in malware detection. 91-98 - Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos:
An unsupervised method for intrusion detection using spectral clustering. 99-106 - Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. 107-114
Bio-Inspired Approaches
- Joseph A. Brown, Sheridan K. Houghten, Beatrice M. Ombuki-Berman:
Genetic algorithm cryptanalysis of a substitution permutation network. 115-121 - Chet Langin, Hongbo Zhou, Shahram Rahimi, Bidyut Gupta, Mehdi R. Zargham, Mohammad R. Sayeh:
A self-organizing map and its modeling for discovering malignant network traffic. 122-129 - Eric S. Imsand, Deon Garrett, John A. Hamilton Jr.:
User identification using GUI manipulation patterns and artificial neural networks. 130-135 - Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka:
Generating mimicry attacks using genetic programming: A benchmarking study. 136-143 - Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson:
Network security using self organized multi agent swarms. 144-151
Miscellaneous topics
- Sahin Renckes, Huseyin Polat, Yusuf Oysal:
Finding the state sequence maximizing P(O; I|λ) on distributed HMMs with Privacy. 152-158 - Stephen Torri, Winard Britt, John A. Hamilton Jr.:
A compiler classification framework for use in reverse engineering. 159-166 - Riyad Alshammari, Nur Zincir-Heywood:
Generalization of signatures for SSH encrypted traffic identification. 167-174 - Li Yang, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege:
Discovering topics from dark websites. 175-179
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.